/libcore/ojluni/src/main/java/java/nio/file/attribute/ |
AclEntryType.java | 38 ALLOW,
|
/external/nist-sip/java/gov/nist/javax/sip/header/ |
Allow.java | 32 * Allow SIPHeader. 40 public final class Allow extends 53 public Allow() { 54 super(ALLOW); 60 public Allow(String m) { 61 super(ALLOW); 80 + ", Allow, setMethod(), the method parameter is null.");
|
SIPHeaderNames.java | 48 public static final String ALLOW = AllowHeader.NAME; //5
|
/external/nist-sip/java/gov/nist/javax/sip/parser/ |
AllowParser.java | 33 * Parser for Allow header. 45 * @param allow the header to parse 47 public AllowParser(String allow) { 48 super(allow); 60 * parse the Allow String header 71 headerName(TokenTypes.ALLOW); 73 Allow allow = new Allow(); local 74 allow.setHeaderName(SIPHeaderNames.ALLOW) [all...] |
TokenTypes.java | 58 public static final int ALLOW = START + 21;
|
/libcore/luni/src/test/java/libcore/java/nio/file/attribute/ |
AclEntryTest.java | 41 .setType(AclEntryType.ALLOW) 46 assertEquals(AclEntryType.ALLOW, aclEntry.type());
|
/external/selinux/python/sepolicy/sepolicy/ |
booleans.py | 34 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
|
communicate.py | 43 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
|
network.py | 27 allows = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src, sepolicy.CLASS: tclass, sepolicy.PERMS: perm})
|
transition.py | 28 trans = sepolicy.search([sepolicy.ALLOW], {sepolicy.SOURCE: src})
|
__init__.py | 44 ALLOW = 'allow' 311 valid_types = set([ALLOW, AUDITALLOW, NEVERALLOW, DONTAUDIT, TRANSITION, ROLE_ALLOW]) 331 if ALLOW in types: 332 tertypes.append(ALLOW) 364 ratypes = ['allow'] 444 permlist = search([ALLOW], {'source': setype, 'permlist': ['open', 'write'], 'class': 'file'}) 657 permlist = search([ALLOW], {'source': setype}) 675 ruletype=[ALLOW], 791 q = setools.RBACRuleQuery(_pol, ruletype=[ALLOW]) [all...] |
/packages/apps/Gallery/src/com/android/camera/ |
BitmapManager.java | 40 private static enum State {CANCEL, ALLOW} 42 public State mState = State.ALLOW; 50 } else if (mState == State.ALLOW) { 51 s = "Allow"; 101 // allow decoding by default 110 getOrCreateThreadStatus(t).mState = State.ALLOW;
|
/system/netd/server/ |
FirewallControllerTest.cpp | 115 mFw.setUidRule(STANDBY, 12345, ALLOW); 129 mFw.setUidRule(DOZABLE, 54321, ALLOW); 155 mFw.setUidRule(NONE, 54321, ALLOW); 269 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); 272 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW));
|
FirewallController.h | 28 enum FirewallRule { DENY, ALLOW }; 42 * defined ALLOW rules.
|
FirewallController.cpp | 179 if (rule == ALLOW && mIfaceRules.find(iface) == mIfaceRules.end()) { 220 op = (rule == ALLOW)? "-I" : "-D"; 266 // Allow ICMPv6 packets necessary to make IPv6 connectivity work. http://b/23158230 . 301 // Always allow networking on loopback. 305 // Allow TCP RSTs so we can cleanly close TCP connections of apps that no longer have network
|
TrafficControllerTest.cpp | 173 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, WHITELIST)); 184 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, BLACKLIST)); 190 EXPECT_EQ(-ENOENT, mTc.changeUidOwnerRule(chain, uid, ALLOW, BLACKLIST)); 444 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(mFakeDozableUidMap, uid, ALLOW, WHITELIST))); 453 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(mFakeDozableUidMap, uid, ALLOW, BLACKLIST))); 457 ASSERT_FALSE(isOk(mTc.updateOwnerMapEntry(mFakeDozableUidMap, uid, ALLOW, BLACKLIST))); 467 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(NONE, TEST_UID, ALLOW, WHITELIST)); 468 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(INVALID_CHAIN, TEST_UID, ALLOW, WHITELIST));
|
/external/mdnsresponder/mDNSShared/ |
dnsextd_lexer.l | 64 allow-update return ALLOWUPDATE; 65 allow-query return ALLOWQUERY; 70 allow return ALLOW;
|
/external/minijail/tools/ |
generate_seccomp_policy.py | 38 ALLOW = "%s: 1" 161 print ALLOW % syscall
|
/external/guava/guava/src/com/google/common/net/ |
HttpHeaders.java | 123 /** The HTTP {@code Access-Control-Allow-Headers} header field name. */ 124 public static final String ACCESS_CONTROL_ALLOW_HEADERS = "Access-Control-Allow-Headers"; 125 /** The HTTP {@code Access-Control-Allow-Methods} header field name. */ 126 public static final String ACCESS_CONTROL_ALLOW_METHODS = "Access-Control-Allow-Methods"; 127 /** The HTTP {@code Access-Control-Allow-Origin} header field name. */ 128 public static final String ACCESS_CONTROL_ALLOW_ORIGIN = "Access-Control-Allow-Origin"; 129 /** The HTTP {@code Access-Control-Allow-Credentials} header field name. */ 130 public static final String ACCESS_CONTROL_ALLOW_CREDENTIALS = "Access-Control-Allow-Credentials"; 137 /** The HTTP {@code Allow} header field name. */ 138 public static final String ALLOW = "Allow" [all...] |
/external/selinux/checkpolicy/ |
policy_scan.l | 140 ALLOW | 141 allow { return(ALLOW); }
|
/packages/apps/DocumentsUI/tests/functional/com/android/documentsui/ |
FileCopyUiTest.java | 60 private static final String ALLOW = "ALLOW"; 184 bots.main.findMenuLabelWithName(ALLOW).click();
|
FileDeleteUiTest.java | 60 private static final String ALLOW = "ALLOW"; 184 bots.main.findMenuLabelWithName(ALLOW).click();
|
/packages/apps/Email/provider_src/com/android/email/ |
AttachmentInfo.java | 60 public static final int ALLOW = 0x00; 118 int denyFlags = ALLOW;
|
/external/selinux/libselinux/src/ |
audit2why.c | 25 #define ALLOW 0 382 RETURN(ALLOW) 482 PyModule_AddIntConstant(m,"ALLOW", ALLOW);
|
/external/wpa_supplicant_8/src/eap_server/ |
eap_server_tnc.c | 21 enum { ALLOW, ISOLATE, NO_ACCESS, NO_RECOMMENDATION } recommendation; 178 case ALLOW: 370 data->recommendation = ALLOW;
|